The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
If the object contains attributes that were only intended for internal use, then their unexpected modification could lead to a vulnerability. This weakness is sometimes known by the language-specific mechanisms that make it possible, such as mass assignment, autobinding, or object injection.
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2024-3283
Application for using LLMs allows modification of a sensitive variable using mass assignment.
CVE: CVE-2012-2054
Mass assignment allows modification of arbitrary attributes using modified URL.
CVE: CVE-2012-2055
Source version control product allows modification of trusted key using mass assignment.
CVE: CVE-2008-7310
Attackers can bypass payment step in e-commerce product.
CVE: CVE-2013-1465
Use of PHP unserialize function on untrusted input allows attacker to modify application configuration.
CVE: CVE-2012-3527
Use of PHP unserialize function on untrusted input in content management system might allow code execution.
CVE: CVE-2012-0911
Use of PHP unserialize function on untrusted input in content management system allows code execution using a crafted cookie value.
CVE: CVE-2012-0911
Content management system written in PHP allows unserialize of arbitrary objects, possibly allowing code execution.
CVE: CVE-2011-4962
Content management system written in PHP allows code execution through page comments.
CVE: CVE-2009-4137
Use of PHP unserialize function on cookie value allows remote code execution or upload of arbitrary files.
CVE: CVE-2007-5741
Content management system written in Python interprets untrusted data as pickles, allowing code execution.
CVE: CVE-2011-2520
Python script allows local users to execute code via pickled data.
CVE: CVE-2005-2875
Python script allows remote attackers to execute arbitrary code using pickled objects.
CVE: CVE-2013-0277
Ruby on Rails allows deserialization of untrusted YAML to execute arbitrary code.
CVE: CVE-2011-2894
Spring framework allows deserialization of objects from untrusted sources to execute arbitrary code.
CVE: CVE-2012-1833
Grails allows binding of arbitrary parameters to modify arbitrary object properties.
CVE: CVE-2010-3258
Incorrect deserialization in web browser allows escaping the sandbox.
CVE: CVE-2008-1013
Media library allows deserialization of objects by untrusted Java applets, leading to arbitrary code execution.
N/A
N/A
Phase | Note |
---|---|
Architecture and Design | N/A |
Implementation | N/A |
Intro: This function sets object attributes based on a dot-separated path.
Body: This function does not check if the attribute resolves to the object prototype. These codes can be used to add "isAdmin: true" to the object prototype.
function setValueByPath (object, path, value) { const pathArray = path.split("."); const attributeToSet = pathArray.pop(); let objectToModify = object; for (const attr of pathArray) { if (typeof objectToModify[attr] !== 'object') { objectToModify[attr] = {}; } objectToModify = objectToModify[attr]; } objectToModify[attributeToSet] = value; return object; }